Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Security Vs. Flexibility: Must IT Management Choose?
sponsored by Faronics
WHITE PAPER:
This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.
Posted: 22 Aug 2008 | Published: 22 Aug 2008
|
|
|
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER:
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
The Value of Integrated Security
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
Posted: 09 Jun 2009 | Published: 07 Nov 2008
|
|
|
Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER:
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008
|
|
|
Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER:
This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008
|
|
|
The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER:
This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006
|
|
|
The Basics of ZigBee Transmitter Testing
sponsored by National Instruments
WHITE PAPER:
Zigbee is a wireless standard for personal area network (PAN) sensor monitoring and control.
Posted: 13 Aug 2008 | Published: 11 Aug 2008
|
|
|
The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007
|
|
|
Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER:
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008
|
|